Quote:
Originally Posted by Rizla
Seeing as it's installed by a user on their device (presumably connected to their computer via a cable), and another user cannot access it remotely, I don't see any practical threat, but obviously you know a lot more about it than me, and I understand your reluctance to discuss the details.
Edit: Okay, I see that if the device is rooted, theoretically connecting to a malicious web page could be a threat.
|
I was only an interested bystander and all I know are the general principles involved.
Plus, B.D. spent months of work on it.

Its his story to tell, not mine.
I am just trying to do my 'helpdesk' thing here.